From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-9.1 required=3.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, MENTIONS_GIT_HOSTING,SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 0D629C433E7 for ; Wed, 2 Sep 2020 05:45:10 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id E057A20758 for ; Wed, 2 Sep 2020 05:45:09 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=linaro.org header.i=@linaro.org header.b="pWeCaUwg" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726212AbgIBFpJ (ORCPT ); Wed, 2 Sep 2020 01:45:09 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44824 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725774AbgIBFpG (ORCPT ); Wed, 2 Sep 2020 01:45:06 -0400 Received: from mail-vk1-xa42.google.com (mail-vk1-xa42.google.com [IPv6:2607:f8b0:4864:20::a42]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6B481C061244 for ; Tue, 1 Sep 2020 22:45:06 -0700 (PDT) Received: by mail-vk1-xa42.google.com with SMTP id n193so938814vkf.12 for ; Tue, 01 Sep 2020 22:45:06 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=3/Xek+aHJ1oV+/IRX9g/TNwyAOedPvUNfL3S5dPG/BE=; b=pWeCaUwgspRSRjIOPFTl5saGeyVvo3wFZ0lHctrmXK6LaY0E5sEejX7ovnxDXDsAsl 2SmtwFX3FjfXTE0RsrywFV/i+81sJaHckdo5q4pAJQsMv8hRN7bPT/Fq82lDs9OT15vH PPWQAzABxPUbrfIMoZRS3Eqa818CJZtty8JUGgNW4rJgMGGM0O4nSPJUX2zoQq9F5Z5M i/OopyoZOJyJA8RO851+DAjrU3LFc/Ien0GwQjZnf4qbCLC+wrkzIK9EmXLnNuIR5fbN iX3/j4fid7C4r0gHGrhVrvdC+AnI08XWRJpOWuSUyAlVKl3etSjUJZ3SSAwMAIkqc/Ar isUw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=3/Xek+aHJ1oV+/IRX9g/TNwyAOedPvUNfL3S5dPG/BE=; b=beFW2X7E35c2iktS1LX7if9hSjY3lTzvilhf9py2/0J+t81gaAIjG946tNKKroFvH7 ai40VnR7AJClR4AZIiwFM2dHM6uQkJcv/JnT6gnbDB/7Z5f17O8R7319HEtjN/pC3OrQ r+IL+ZEy1lyzXnq7LNil1HfNCgXvk+Kn21CoU1bNAVZK6j6GBt0bBQpLG1bqN5A1aosh 8RVQ6OzrW/z2p4GjbqOWvvtA66OA9PVeugMAjVhWmhNvYokhZFxjDM+GaxueYJpbVaRt CS21dEPPrCuwh6LOJndt3i8qEvGQF37A+3S/nY4G4gn4AnkYaWZ7iVcK15j7t6ib134C B9oA== X-Gm-Message-State: AOAM533BSdwctZc6TXeAYv2MWdwprVJiVhsSRReIqRnfnJXBGvxzdaeN e+4N6GQL8a+WeGVekqbaIx0nTyZ/S/7r9KrReSA6jQ== X-Google-Smtp-Source: ABdhPJz35iMbbKWurAIhsbjOySH/ZZUKjNUocr7QXr2PmB7sPue60+rLanIr6NVsFJm+azlokdwEBEQL+Ep20bsc1Kg= X-Received: by 2002:ac5:c8b9:: with SMTP id o25mr4183591vkl.51.1599025505408; Tue, 01 Sep 2020 22:45:05 -0700 (PDT) MIME-Version: 1.0 References: <20200901151000.800754757@linuxfoundation.org> In-Reply-To: <20200901151000.800754757@linuxfoundation.org> From: Naresh Kamboju Date: Wed, 2 Sep 2020 11:14:54 +0530 Message-ID: Subject: Re: [PATCH 5.8 000/255] 5.8.6-rc1 review To: Greg Kroah-Hartman Cc: open list , Linus Torvalds , Andrew Morton , Guenter Roeck , Shuah Khan , patches@kernelci.org, Ben Hutchings , lkft-triage@lists.linaro.org, linux- stable , linux-mm , X86 ML Content-Type: text/plain; charset="UTF-8" Sender: stable-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: stable@vger.kernel.org On Tue, 1 Sep 2020 at 21:06, Greg Kroah-Hartman wrote: > > This is the start of the stable review cycle for the 5.8.6 release. > There are 255 patches in this series, all will be posted as a response > to this one. If anyone has any issues with these being applied, please > let me know. > > Responses should be made by Thu, 03 Sep 2020 15:09:01 +0000. > Anything received after that time might be too late. > > The whole patch series can be found in one patch at: > https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.8.6-rc1.gz > or in the git tree and branch at: > git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.8.y > and the diffstat can be found below. > > thanks, > > greg k-h > While running LTP CVE test suite on i386 this BUG triggered after the known warning. Please find below full test log link [1]. This was reported on the mailing list on next-20200811 but did not get any reply [2]. [ 138.177043] ------------[ cut here ]------------ [ 138.181675] WARNING: CPU: 1 PID: 8301 at mm/mremap.c:230 move_page_tables+0x6ef/0x720 [ 138.189515] Modules linked in: x86_pkg_temp_thermal [ 138.194436] CPU: 1 PID: 8301 Comm: true Not tainted 5.8.6-rc1 #1 [ 138.194437] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.2 05/23/2018 [ 138.194439] EIP: move_page_tables+0x6ef/0x720 <> [ 802.156512] BUG: unable to handle page fault for address: fe402000 [ 802.162703] #PF: supervisor write access in kernel mode [ 802.167927] #PF: error_code(0x0002) - not-present page [ 802.173064] *pde = 23e61067 *pte = 64b32163 [ 802.177329] Oops: 0002 [#1] SMP [ 802.180469] CPU: 1 PID: 13118 Comm: cve-2017-17053 Tainted: G W 5.8.6-rc1 #1 [ 802.188811] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.2 05/23/2018 [ 802.196199] EIP: memcpy+0x14/0x30 [ 802.199517] Code: e8 a1 72 c5 ff 0f 31 31 c3 59 58 eb 85 cc cc cc cc cc cc cc cc cc 3e 8d 74 26 00 55 89 e5 57 89 c7 56 89 d6 53 89 cb c1 e9 02 a5 89 d9 83 e1 03 74 02 f3 a4 5b 5e 5f 5d c3 8d b4 26 00 00 00 [ 802.218259] EAX: fe402000 EBX: 00010000 ECX: 00004000 EDX: fb3dd000 [ 802.224518] ESI: fb3dd000 EDI: fe402000 EBP: ea799ddc ESP: ea799dd0 [ 802.230773] DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0068 EFLAGS: 00010206 [ 802.237551] CR0: 80050033 CR2: fe402000 CR3: 1eee9000 CR4: 003406d0 [ 802.243809] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000 [ 802.250065] DR6: fffe0ff0 DR7: 00000400 [ 802.253897] Call Trace: [ 802.256345] ldt_dup_context+0x6b/0x90 [ 802.260093] dup_mm+0x2b3/0x480 [ 802.263230] copy_process+0x13d6/0x1650 [ 802.267062] _do_fork+0x7b/0x3b0 [ 802.270284] ? set_next_entity+0xa9/0x250 [ 802.274290] __ia32_sys_clone+0x77/0xa0 [ 802.278119] do_syscall_32_irqs_on+0x3d/0x250 [ 802.282472] ? do_fast_syscall_32+0x2d/0xc0 [ 802.286656] ? trace_hardirqs_on+0x30/0xf0 [ 802.290746] ? trace_hardirqs_off_finish+0x32/0xa0 [ 802.295533] ? do_SYSENTER_32+0x15/0x20 [ 802.299371] do_fast_syscall_32+0x49/0xc0 [ 802.303374] do_SYSENTER_32+0x15/0x20 [ 802.307032] entry_SYSENTER_32+0x9f/0xf2 [ 802.310956] EIP: 0xb7fbb549 [ 802.313747] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d 76 00 58 b8 77 00 00 00 cd 80 90 8d 76 [ 802.332483] EAX: ffffffda EBX: 01200011 ECX: 00000000 EDX: 00000000 [ 802.338742] ESI: 00000000 EDI: b7dbdba8 EBP: b7dbd348 ESP: b7dbd2f0 [ 802.344998] DS: 007b ES: 007b FS: 0000 GS: 0033 SS: 007b EFLAGS: 00000246 [ 802.351776] Modules linked in: algif_hash x86_pkg_temp_thermal [ 802.357608] CR2: 00000000fe402000 [ 802.360920] ---[ end trace ea48459ba50c2a87 ]--- [ 802.365542] EIP: memcpy+0x14/0x30 [ 802.368858] Code: e8 a1 72 c5 ff 0f 31 31 c3 59 58 eb 85 cc cc cc cc cc cc cc cc cc 3e 8d 74 26 00 55 89 e5 57 89 c7 56 89 d6 53 89 cb c1 e9 02 a5 89 d9 83 e1 03 74 02 f3 a4 5b 5e 5f 5d c3 8d b4 26 00 00 00 [ 802.387593] EAX: fe402000 EBX: 00010000 ECX: 00004000 EDX: fb3dd000 [ 802.393852] ESI: fb3dd000 EDI: fe402000 EBP: ea799ddc ESP: ea799dd0 [ 802.400107] DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0068 EFLAGS: 00010206 [ 802.406887] CR0: 80050033 CR2: fe402000 CR3: 1eee9000 CR4: 003406d0 [ 802.413143] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000 [ 802.419400] DR6: fffe0ff0 DR7: 00000400 full test log, [1] https://qa-reports.linaro.org/lkft/linux-stable-rc-5.8-oe/build/v5.8.5-256-gad57c5b5e64d/testrun/3148295/suite/linux-log-parser/test/check-kernel-bug-1727425/log [2] https://lore.kernel.org/linux-mm/CA+G9fYsiNgoh09h0paf1+UTKhPnn490QCoLB2dRFhMT+Cjh9RA@mail.gmail.com/ -- Linaro LKFT https://lkft.linaro.org